QUESTION 54Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. You have a computer named Computer1 that has storage configured as shown in the following table.Pool1 contains a storage space named Space1 that is 300 GB. Pool3 contains a storage space named Space2 that is 100 GB.Pool2 is empty.You discover that Distc2 experiences physical errors.You need to ensure that all of the data in Space1 is stored on other disks in the storage pool only.What should you use?

QUESTION 55Note: This question is part of a series of a questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. You have a computer named Computer1 that has storage configured as shown in the following table.Pool1 contains a storage space named Space1 that is 300 GB. Pool3 contains a storage space named Space2 that is 100 GB.Pool2 is empty.Disk8 fails.You add a new disk named Disk9 to Pool3.You need to remove Disk8 from Pool3.What should you use?

QUESTION 56Note: This question is part of a series of a questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. You have a computer named Computer1 that has storage configured as shown in the following table.Pool1 contains a storage space named Space1 that is 300 GB. Pool3 contains a storage space named Space2 that is 100 GB.Pool2 is empty.You need to configure Space2 to be 2 TB.What should you use?

Answer: AExplanation:You only have 200Gb of physical disks.. you'll need to add new physical disks first.

QUESTION 57Note: This question is part of a series of a questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. You have a computer named Computer1 that has storage configured as shown in the following table.Pool1 contains a storage space named Space1 that is 300 GB. Pool3 contains a storage space named Space2 that is 100 GB.Pool2 is empty.Space1 contains 10 folders.You need to access each folder as a separate drive from Windows Explorer.What should you use?

QUESTION 58Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols.You have mobile devices that run Windows 10 and have VPN connection to the VPN server. You need to ensure that when users work remotely and Connect to the VPN, only traffic for the corporate network is sent through the VPN server.What should you do?

A. Click Turn on password protected sharing.B. Disable Network Discovery.C. Modify the Profile settings of an incoming firewall rule.D. Run the Add-VpnConnectionTriggerApplication cmdlet.E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.F. Run the New-VpnConnection cmdlet.G. Run the Set-NetConnectionProfile cmdlet.H. Run the Set-VPNConnection cmdlet.

QUESTION 59Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. A user connects to a wireless network and receives the following message: "Do you want to allow your PC to be discoverable by other PCs and devices on this network?" The user clicks No.The user is unable to browse to the shared folders of other computers on the network by using File E explorer.You need to ensure that the user can browse to the other computers.What should you do?

A. Click Turn on password protected sharing.B. Disable Network Discovery.C. Modify the Profile settings of an incoming firewall rule.D. Run the Add-VpnConnectionTrtggcrApplication cmdlet.E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.F. Run the New-VpnConnection cmdlet.G. Run the Set-NetConncctionProfile cmdlet.H. Run the Set-VPNConncction cmdlet.

QUESTION 60Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. Your network contains a single Active Directory domain. The domain contains devices that run windows 10 Enterprise.You need to prevent computers from connecting to hosts on subnet 131.107.0.0/24.What should you do?

A. Click Turn on password protected sharingB. Disable Network Discovery.C. Modify the Profile settings of an incoming firewall rule.D. Run the Add-VpnConnectionTriggerApplication cmdlet.E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.F. Run the New-VpnConnection cmdlet.G. Run the Set-NetConnectionProfile cmdlet.H. Run the Set-VPNConnection cmdlet.

Answer: EExplanation:Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter. This allows you to create a new rule that blocks outbound traffic to the specified IP.

QUESTION 61Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. Your network contains a single Active Directory domain. The domain contains computers that run Windows 10 Enterprise. The computers are configured as shown in the following table.When User1 works remotely, the user fails to access shared folders on the corporate network. When User 2 and User3 work remotely, they successfully connect to the shared folders on the corporate network.You need to ensure that User1 can connect to the shared folders without user interaction.What should you do?

A. Click Turn on password protected sharing.B. Disable Network Discovery.C. Modify the Profile settings of an incoming firewall rule.D. Run the Add-VpnConnectionTriggerApplication cmdlet.E. Run the New-NetFirewallRule cmdlet and specify the -Direction Outbound parameter.F. Run the Ncw-VpnConnection cmdlet.G. Run the Set-NetConnectionProfile cmdlet.H. Run the Set-VPNConnection cmdlet

Answer: EExplanation:Creating a new Allowed Firewall rule will allow the traffic to flow.

QUESTION 62Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.Start of repeated scenarioYour network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.All of the servers run Windows Server 2012 R2.Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA. The network contains a mainframe computer that is administered by using the Telnet protocol. The domain contains four client computers configured as shown in the following table.All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA.Remote Desktop is enabled on Computer4.Your company identifies the following requirements:- Ensure that you can test unsigned device drivers on Computer1- Enable Credential Guard on Computer2.- Run commands and cmdlets remotely on computer2.- Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.- Ensure that User1 can view and interact with a desktop session of User3.- Ensure that User2 can use Telnet to manage the mainframe. - Ensure that User4 can use Remote Desktop to access Computer4 remotely.End of repeated scenario.You need to meet the requirement of Computer1.Which tool should you use on Computer1?

QUESTION 63Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.Start of repeated scenarioYour network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.All of the servers run Windows Server 2012 R2.Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA. The network contains a mainframe computer that is administered by using the Telnet protocol. The domain contains four client computers configured as shown in the following table.All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA.Remote Desktop is enabled on Computer4.Your company identifies the following requirements:- Ensure that you can test unsigned device drivers on Computer1- Enable Credential Guard on Computer2.- Run commands and cmdlets remotely on computer2.- Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.- Ensure that User1 can view and interact with a desktop session of User3.- Ensure that User2 can use Telnet to manage the mainframe. - Ensure that User4 can use Remote Desktop to access Computer4 remotely.End of repeated scenario.You need to recommend a solution to meet the requirements of User1.What should you include in the recommendation?

QUESTION 64Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.Your network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.All of the servers run Windows Server 2012 R2.Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA. The network contains a mainframe computer that is administered by using the Telnet protocol. The domain contains four client computers configured as shown in the following table.All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA.Remote Desktop is enabled on Computer4.Your company identifies the following requirements:- Ensure that you can test unsigned device drivers on Computer1- Enable Credential Guard on Computer2.- Run commands and cmdlets remotely on computer2.- Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.- Ensure that User1 can view and interact with a desktop session of User3.- Ensure that User2 can use Telnet to manage the mainframe. - Ensure that User4 can use Remote Desktop to access Computer4 remotely.